Senior Cyber Incident Response (IR) Analyst
Title:Senior Incident Response Analyst (Temp-to-Perm). Highly prefer EST or Central Time Zone:• Relevant GIAC certifications such as GCIH, GSEC, GCIA, or GCFE. • Experience in capture-the-flag competitions or similar hands-on skills development. We are seeking a highly experienced Incident Response Analyst for a temp-to-perm opportunity supporting enterprise-level cyber defense operations. The ideal candidate has deep experience in incident response, cybersecurity analysis, and threat detection across complex environments.Responsibilities:• Support the identification, containment, eradication, and recovery of sophisticated level 2 and level 3 security incidents. • Provide technical guidance to cyber defense teams and assist in the resolution of complex incidents. • Analyze host logs, network traffic logs, firewall data, IDS/IPS alerts, and other telemetry to identify threats and vulnerabilities. • Coordinate incident response activities across internal IT teams, MSSPs, third-party vendors, and business units. • Perform incident triage including determining scope, urgency, and potential business impact.• Track and document incidents from detection through final resolution. • Collect and analyze intrusion artifacts, including malware samples and suspicious files. • Maintain and update incident management and ticketing systems with accurate and timely information. • Recommend short- and long-term improvements to security controls and IR processes. • Collaborate with intelligence analysts to correlate threat data and enhance detection capabilities. • Contribute to the development and maintenance of incident response procedures and playbooks.• Produce clear reports, guidance, and after-action summaries for stakeholders. • Conduct trend analysis on incidents and recurring threat activity. RequiredExperience:• 8+ years in a cyber defense, incident response, or cybersecurity analyst role, or a bachelor’s degree with 4+ years of relevant experience. • Strong experience leading or supporting IR for medium to high-complexity incidents. • Expert-level proficiency with EDR platforms. • Hands-on experience with Splunk, correlation searches, and enterprise security monitoring.• Familiarity with ESAs, open-source malware analysis tools, and sandboxing technologies. • Strong understanding of network fundamentals, threat vectors, and the full incident lifecycle. • Ability to handle multiple incidents simultaneously while maintaining accurate documentation. PreferredQualifications:• Relevant GIAC certifications such as GCIH, GSEC, GCIA, or GCFE. • Experience in capture-the-flag competitions or similar hands-on skills development. Compensation:• Salary for the permanent position is targeted at approximately $140,000 annually, depending on experience.Apply tot his job